Xen

Xen

483 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 23.11.2012 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

XENMEM_populate_physmap in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when translating paging mode is not used, allows local PV OS guest kernels to cause a denial of service (BUG triggered and host crash) via invalid flags such as...

  • EPSS 0.11%
  • Veröffentlicht 23.11.2012 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

(1) TMEMC_SAVE_GET_CLIENT_WEIGHT, (2) TMEMC_SAVE_GET_CLIENT_CAP, (3) TMEMC_SAVE_GET_CLIENT_FLAGS and (4) TMEMC_SAVE_END in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (NULL pointer d...

  • EPSS 0.07%
  • Veröffentlicht 23.11.2012 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

PHYSDEVOP_map_pirq in Xen 4.1 and 4.2 and Citrix XenServer 6.0.2 and earlier allows local HVM guest OS kernels to cause a denial of service (host crash) and possibly read hypervisor or guest memory via vectors related to a missing range check of map-...

  • EPSS 0.12%
  • Veröffentlicht 23.11.2012 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device mode...

  • EPSS 0.08%
  • Veröffentlicht 23.11.2012 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The GNTTABOP_swap_grant_ref sub-operation in the grant table hypercall in Xen 4.2 and Citrix XenServer 6.0.2 allows local guest kernels or administrators to cause a denial of service (host crash) and possibly gain privileges via a crafted grant refer...

  • EPSS 0.09%
  • Veröffentlicht 23.11.2012 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The graphical console in Xen 4.0, 4.1 and 4.2 allows local OS guest administrators to obtain sensitive host resource information via the qemu monitor. NOTE: this might be a duplicate of CVE-2007-0998.

  • EPSS 0.11%
  • Veröffentlicht 21.11.2012 23:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."

  • EPSS 0.08%
  • Veröffentlicht 21.11.2012 23:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The (1) domain_pirq_to_emuirq and (2) physdev_unmap_pirq functions in Xen 2.2 allows local guest OS administrators to cause a denial of service (Xen crash) via a crafted pirq value that triggers an out-of-bounds read.

  • EPSS 0.11%
  • Veröffentlicht 21.11.2012 23:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assert...

  • EPSS 0.07%
  • Veröffentlicht 21.11.2012 23:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Xen 4.0 through 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hy...